General

  • Target

    ed.apk

  • Size

    2.8MB

  • MD5

    24142fc156fb6816a3d7a0f7c6e3a3cf

  • SHA1

    7bca3dcf78d1fac90dc140d12a80fa95a9a60d1b

  • SHA256

    95daed761fda53bc7acdce7b880c1cb661bf75988084914e0958d33314768fa1

  • SHA512

    e1241e02bfb9402909a65065c8093032f07800ae446a25f5d8339cd55633eae017fd13279b2da572f0f90e8ee2f06915232f409e78de10af33178028006fe756

  • SSDEEP

    49152:UKFucmXlLr9Iml8aY7PTNDLARYX8hojPml+5RA:bucAlLJ92aY7PTNXARAvjPmlZ

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • ed.apk
    .apk android

    io.spck

    .main


  • lmain.bal
  • url.txt

Android Permissions

ed.apk

Permissions

io.spck.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

android.permission.INTERNET

android.permission.READ_SMS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

com.google.android.gms.permission.AD_ID

io.spck.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS